WO2003009113A1 - A method for safe and fast connection of a first computer to a second computer having limited access ability - Google Patents

A method for safe and fast connection of a first computer to a second computer having limited access ability Download PDF

Info

Publication number
WO2003009113A1
WO2003009113A1 PCT/SE2002/001367 SE0201367W WO03009113A1 WO 2003009113 A1 WO2003009113 A1 WO 2003009113A1 SE 0201367 W SE0201367 W SE 0201367W WO 03009113 A1 WO03009113 A1 WO 03009113A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer
fingerprint
fingerprints
databank
register
Prior art date
Application number
PCT/SE2002/001367
Other languages
French (fr)
Inventor
Bo Bengtsson
Sören FLINK
Original Assignee
Safe Connect Sweden Aktiebolag
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Safe Connect Sweden Aktiebolag filed Critical Safe Connect Sweden Aktiebolag
Publication of WO2003009113A1 publication Critical patent/WO2003009113A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party

Definitions

  • a company may wish to contact a branch office in another part of the world whilst avoiding industrial espionage; a physician who needs to read remotely situated case records of a patient will, naturally, do this without an unauthorised person having access to tlie records at the same time; banks desire to execute their services without danger of currency fraud, which are, unfortunately, ever more usual at the present time. Examples of other situations may include the desire of a salesman to register an order, or the need of a company accountant to check an item in someone's accounts.
  • the use options are many, and computers are now being equipped with fingerprint readers as standard to an ever increasing extent.
  • the object of the present invention is to provide absolute secure control over what is allowed through to a computer, a database, both quickly and simply without tl e user needing to learn new codes.
  • the method of safe and quick connection of a first computer to a second computer having a limited access ability involves reading into the first computer a register-data that is sent to a data bank which includes a plurality of fingerprints, reading into the first computer the fingerprint of a valid user, this fingerprint also being sent to the databank; causing a comparison to be made in the databank between a fingerprint included in said plurality of fingerprints and corresponding to the earlier sent register-data on the one hand and the earlier sent fingerprint of the valid user on the other hand; and connecting the first computer automatically to the second computer when agreement is found between the two fingerprints.
  • Register-data is read into the first computer DI from a chip or some other electronic storage medium, this data being sent, e.g., via the Internet, to a databank DB that includes a register 10 in which a plurality of fingerprints are stored.
  • Fingerprints 12 belonging to a valid user are read into the first computer DI and sent to the databank DB, via the Internet.
  • a comparison is made in a comparison circuit 13 in the databank DB between fingerprints 11 included in said plurality of fingerprints 10 and corresponding to the earlier transmitted register-data on the one hand, and the earlier transmitted fingerprint 12 of the valid user (the doctor) on the other hand.
  • the computer DI and the computer D2 are coupled automatically when agreement is found between tlie two fingerprints 11 and 12, via points 14 and 15, possibly in an encrypted form for encrypted transmission between the two computers.
  • connection desired is prevented from taking place when there is lack of agreement between the fingerprints 11 and the fingerprint 12.
  • the proposed computer coupling security routine has been found extremely easy to use and to provide a positive solution to a number of security problems and is thought to have a future in respect of a large number of practical use possibilities.

Abstract

A method for safe and fast connection of a first computer (D1) to a second computer (D2) that has limited access ability involves reading into the first computer (D1) a register-data, which is sent to a databank (DB) that includes a register (10) which includes plurality of fingerprints; reading into the first computer (D1) a fingerprint (12) of a valid user, said fingerprint (12) also being sent to the databank (DB); carrying out in the databank (DB) a comparison between a fingerprint (11) included in said plurality of fingerprints (10) and corresponding to the earlier transmitted register-data no the one hand, and the fingerprint (12) earlier sent by the valid user on the other hand; and connecting the first computer to the second computer (D2) automatically (via 14, 15) when agreement is found between the two fingerprints (11, 12).

Description

A METHOD FOR SAFE AND FAST CONNECTION OF A FIRST COMPUTER TO A SECOND COMPUTER HAVING LIMITED ACCESS ABILITY
TECHNICAL FIELD
The transmission or exchange of information between computers can be effected per se relatively quickly and simply with the aid of present-day computer technology. However, the demand for security, simplicity and speed increases with time.
For example, a company may wish to contact a branch office in another part of the world whilst avoiding industrial espionage; a physician who needs to read remotely situated case records of a patient will, naturally, do this without an unauthorised person having access to tlie records at the same time; banks desire to execute their services without danger of currency fraud, which are, unfortunately, ever more usual at the present time. Examples of other situations may include the desire of a salesman to register an order, or the need of a company accountant to check an item in someone's accounts. The use options are many, and computers are now being equipped with fingerprint readers as standard to an ever increasing extent.
SUMMARY OF THE INVENTION
The object of the present invention is to provide absolute secure control over what is allowed through to a computer, a database, both quickly and simply without tl e user needing to learn new codes.
The method of safe and quick connection of a first computer to a second computer having a limited access ability involves reading into the first computer a register-data that is sent to a data bank which includes a plurality of fingerprints, reading into the first computer the fingerprint of a valid user, this fingerprint also being sent to the databank; causing a comparison to be made in the databank between a fingerprint included in said plurality of fingerprints and corresponding to the earlier sent register-data on the one hand and the earlier sent fingerprint of the valid user on the other hand; and connecting the first computer automatically to the second computer when agreement is found between the two fingerprints. DESCRIPTION OF A PREFERRED EMBODIMENT
The invention will now be described in more detail with reference to the accompanying drawing, which illustrates schematically a coupling between two computers.
It is desired to connect a computer DI to a computer D2, which, for some reason, has a limited access ability. This may be because the computer D2 is intended solely for a physician or doctor.
Register-data is read into the first computer DI from a chip or some other electronic storage medium, this data being sent, e.g., via the Internet, to a databank DB that includes a register 10 in which a plurality of fingerprints are stored.
Fingerprints 12 belonging to a valid user (a doctor) are read into the first computer DI and sent to the databank DB, via the Internet.
It may be appropriate to allow both transmissions between the first computer DI and the databank DB to take place in an encrypted form.
A comparison is made in a comparison circuit 13 in the databank DB between fingerprints 11 included in said plurality of fingerprints 10 and corresponding to the earlier transmitted register-data on the one hand, and the earlier transmitted fingerprint 12 of the valid user (the doctor) on the other hand. The computer DI and the computer D2 are coupled automatically when agreement is found between tlie two fingerprints 11 and 12, via points 14 and 15, possibly in an encrypted form for encrypted transmission between the two computers.
The connection desired is prevented from taking place when there is lack of agreement between the fingerprints 11 and the fingerprint 12.
The proposed computer coupling security routine has been found extremely easy to use and to provide a positive solution to a number of security problems and is thought to have a future in respect of a large number of practical use possibilities.

Claims

CLAIM
A method for safe and fast connection of a first computer (DI) to a second computer (D2) that has limited access ability, characterised by reading into the first computer (DI) a register-data, which is sent to a databank (DB) that includes a register (10) which includes plurality of fingerprints; reading into the first computer (DI) a fingerprint (12) of a valid user, said fingerprint (12) also being sent to the databank (DB); carrying out in the databank (DB) a comparison between a fingerprint (11) mcluded in said plurality of fingerprints (10) and corresponding to the earlier transmitted register-data on the one hand, and the fingerprint (12) earlier sent by the valid user on the other hand; and connecting the first computer to the second computer (D2) automatically (via 14, 15) when agreement is found between the two fingerprints (11, 12).
PCT/SE2002/001367 2001-07-18 2002-07-16 A method for safe and fast connection of a first computer to a second computer having limited access ability WO2003009113A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE0102558-4 2001-07-18
SE0102558A SE0102558L (en) 2001-07-18 2001-07-18 Procedures for securely and quickly connecting a first computer to a second computer with limited availability

Publications (1)

Publication Number Publication Date
WO2003009113A1 true WO2003009113A1 (en) 2003-01-30

Family

ID=20284887

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2002/001367 WO2003009113A1 (en) 2001-07-18 2002-07-16 A method for safe and fast connection of a first computer to a second computer having limited access ability

Country Status (2)

Country Link
SE (1) SE0102558L (en)
WO (1) WO2003009113A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7171680B2 (en) 2002-07-29 2007-01-30 Idesia Ltd. Method and apparatus for electro-biometric identity recognition
EP2500809A3 (en) * 2011-03-18 2016-06-08 Acer Incorporated Handheld devices and related data transmission methods

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5386104A (en) * 1993-11-08 1995-01-31 Ncr Corporation System and method for detecting user fraud in automated teller machine transactions
US5903225A (en) * 1997-05-16 1999-05-11 Harris Corporation Access control system including fingerprint sensor enrollment and associated methods
WO1999039310A1 (en) * 1998-01-30 1999-08-05 Phelps Barry C Biometric authentication system and method
DE19809006A1 (en) * 1998-03-03 1999-09-09 Hamester Cashless financial transaction system with biometric entry device
US6256737B1 (en) * 1999-03-09 2001-07-03 Bionetrix Systems Corporation System, method and computer program product for allowing access to enterprise resources using biometric devices

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5386104A (en) * 1993-11-08 1995-01-31 Ncr Corporation System and method for detecting user fraud in automated teller machine transactions
US5903225A (en) * 1997-05-16 1999-05-11 Harris Corporation Access control system including fingerprint sensor enrollment and associated methods
WO1999039310A1 (en) * 1998-01-30 1999-08-05 Phelps Barry C Biometric authentication system and method
DE19809006A1 (en) * 1998-03-03 1999-09-09 Hamester Cashless financial transaction system with biometric entry device
US6256737B1 (en) * 1999-03-09 2001-07-03 Bionetrix Systems Corporation System, method and computer program product for allowing access to enterprise resources using biometric devices

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7171680B2 (en) 2002-07-29 2007-01-30 Idesia Ltd. Method and apparatus for electro-biometric identity recognition
US7689833B2 (en) 2002-07-29 2010-03-30 Idesia Ltd. Method and apparatus for electro-biometric identity recognition
EP2500809A3 (en) * 2011-03-18 2016-06-08 Acer Incorporated Handheld devices and related data transmission methods

Also Published As

Publication number Publication date
SE0102558L (en) 2003-01-19
SE0102558D0 (en) 2001-07-18

Similar Documents

Publication Publication Date Title
US11664996B2 (en) Authentication in ubiquitous environment
US8020008B2 (en) Microprocessor identity device
ATE347154T1 (en) SECURITY MODULE FOR AN ACCOUNT MANAGEMENT SYSTEM
NO317497B1 (en) Method and apparatus for conditional access
CA2571666A1 (en) Secure identity and personal information storage and transfer
RU2006136310A (en) METHOD FOR IMPLEMENTING PAYMENTS (OPTIONS) AND SYSTEM FOR IMPLEMENTING THE METHOD
CN102364516A (en) Method and system for authenticating payment information of integrated circuit (IC) social security card
CN100565596C (en) Individual authentication system, its method and host apparatus thereof
Schaumüller-Bichl IC-Cards in High-Security Applications
CN114187673A (en) Mobile attendance system based on block chain and method thereof
WO2003073353A3 (en) Smart card for use with health care institutions and financial institutions
WO2004077346A1 (en) Biometric information recognition credit card system and credit card scanner
CN1971639A (en) Method for preventing embezzlement of bank card and system to realize the same method
Neame Effective sharing of health records, maintaining privacy: a practical schema
WO2003009113A1 (en) A method for safe and fast connection of a first computer to a second computer having limited access ability
WO1999046682A9 (en) Mobile intelligent memory (mim) unit with removable security key
Cidon Making IT better: how biometrics can cure healthcare
CN202694414U (en) System for authenticating payment information of IC social security card
US8770486B2 (en) Arrangement, apparatus, and associated method, for providing stored data in secured form for purposes of identification and informational storage
JP2007323116A (en) Card-less settlement terminal equipment, card-less settlement host, and card-less settlement system
CN105096190A (en) Intelligent card locking method and apparatus
CN108121901A (en) A kind of operating right managing and control system based on iris recognition
KR102564395B1 (en) Method of electronic documents authentication and storage
US20230177500A1 (en) Method of conducting financial transactions
KR20030095500A (en) Method for financial transaction using manner to down-load bar-code to mobile communication terminal

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: COMMUNICATION PURSUANT TO RULE 69 EPC (EPO FORM 1205A OF 230604)

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP